SlideShare a Scribd company logo
A Practical Approach to Hacking an 
Enterprise with 
YASUO 
Saurabh Harit {@0xsauby} 
Stephen Hall {@_stephen_h}
root@msf:~$>getuid 
Saurabh Harit (@0xsauby) 
Director of Security Research @Security Compass 
Pentester i.e. Domain Admin at many companies 
Have a secret crush on reverse engineering 
Gym freak / Proud father of two beautiful dogs 
Stephen Hall (@_stephen_h) 
Security Consultant @Security Compass 
… 
… 
Owner of a Christmas hat
What this talk is not about 
No 
0-days 
No 
Shells
Scenario 
You’re on a red-team 
engagement 
You’ve bypassed 
physical security 
You’ve bypassed NAC 
What next? How would 
you pwn the network? 
Vulnerability scanner?
The Problem 
Can’t use network vulnerability scanner 
Have to be Stealth & Quick 
Can’t use Google dorks (internal network) 
site, link, inurl
Where do $hells come 
from? 
It’s not about what, 
it’s about WHERE
Popular Vulnerable Apps 
Apache Tomcat
Popular Vulnerable Apps 
JBoss jmx-console
Popular Vulnerable Apps 
Hudson Jenkins
$hells
Not So Popular Vulnerable 
Apps 
ADManager Plus
Not So Popular Vulnerable 
Apps 
ADManager Plus
Not So Popular Vulnerable 
Apps 
Cyberoam UTM
Not So Popular Vulnerable 
Apps 
Cyberoam UTM
YASUO 
what??? 
Written in ruby 
Did not write it on our flight here 
Scans the network for vulnerable 
applications 
Currently supports around 100+ 
vulnerable applications 
All currently supported apps are 
Metasploit-able
Why Yasuo 
Because there are tons of vulnerable 
applications and its not easy to find them
World Without Automation 
Run nmap scan & manually poke each & every web port 
This CANNOT be fun
What’s currently out there 
Nikto by Chris Sullo 
https://www.cirt.net/Nikto2 
Nmap script – http-enum.nse by Ron Bowes, 
Andrew Orr, Rob Nicholls 
http://nmap.org/nsedoc/scripts/http-enum.html 
Nmap script – http-default-accounts.nse by 
Paulino Calderon 
https://www.nmap.org/nmap-exp/ 
calderon/scripts/http-default-accounts.nse
Exploring Yasuo
Exploring Yasuo
What’s in the Box 
yasuo.rb 
resp200.rb 
default-path.csv 
users.txt 
pass.txt 
GPL
What’s in the Box
Behind the Scenes 
Detects false-positives 
Automatically extracts login form 
Automatically extracts login parameters
What’s New
RaNdOmIzAtIoN!!! 
More robust check to detect false positives 
Properly formatted output table 
More application signatures 
Signatures for IP Cameras / Encoder / 
Decoders 
Modular & Cleaned-up Code – if there is any 
such thing
Demo Time
Challenges 
Exploit-db – great resource but inconsistent format
Challenges 
Dynamic detection of login page and parameters is regex 
based.
Future Development 
Smarter version detection 
Support masscan output format (because y’all love to scan the 
Interwebs) 
Add support for more vulnerable applications, Ofcourse 
Add secondary signature 
Make current crappy code modular 
Add multi-threading 
Add support for vFeed??? 
Change format of default path file – CSV to YAML? or JSON?
CFH (cry for help) 
Signatures Signatures Signatures & Signatures 
Please submit application signatures: 
Post a comment on Github 
Update default path file on Github 
Drop us an Email 
Send a Pigeon.
Questions??? or not
Thank You! 
https://github.com/0xsauby/yasuo 
✖ 
0xsauby saurabh.harit@gmail.com 
_stephen_h perfectlylogical@gmail.com
Credit 
Nmap ruby library - https://github.com/sophsec/ruby-nmap 
The Exploit Database (EDB) - http://www.exploit-db.com/ 
@funkaoshi 
Google Image Cache

More Related Content

PDF
DNS hijacking using cloud providers – No verification needed
PDF
Live Hacking like a MVH – A walkthrough on methodology and strategies to win big
PDF
'Malware Analysis' by PP Singh
PDF
Red Team Methodology - A Naked Look
PDF
Hunting for the secrets in a cloud forest
PPTX
Bsides chicago 2013 honeypots
PPTX
XXE: How to become a Jedi
PDF
OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
DNS hijacking using cloud providers – No verification needed
Live Hacking like a MVH – A walkthrough on methodology and strategies to win big
'Malware Analysis' by PP Singh
Red Team Methodology - A Naked Look
Hunting for the secrets in a cloud forest
Bsides chicago 2013 honeypots
XXE: How to become a Jedi
OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies

What's hot (19)

PPT
Malware Analysis Made Simple
PPTX
Bug Bounty for - Beginners
PDF
Introduction to red team operations
PPTX
Bsides detroit 2013 honeypots
PPTX
Badneedles
PPTX
Bug bounties - cén scéal?
PDF
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
PDF
Next Generation War: EDR vs RED TEAM
PDF
Applying principles of chaos engineering to serverless (O'Reilly Software Arc...
PDF
A @textfiles approach to gathering the world's DNS
PDF
Hacking Web Apps by Brent White
PPTX
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
PDF
Applying principles of chaos engineering to serverless (CodeMesh)
PDF
Internal Pentest: from z3r0 to h3r0
PDF
Understanding and hiding your operations
PPT
Penetration testing, What’s this?
PDF
SignaturesAreDead Long Live RESILIENT Signatures
PDF
Hunting for the secrets in a cloud forest
Malware Analysis Made Simple
Bug Bounty for - Beginners
Introduction to red team operations
Bsides detroit 2013 honeypots
Badneedles
Bug bounties - cén scéal?
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Next Generation War: EDR vs RED TEAM
Applying principles of chaos engineering to serverless (O'Reilly Software Arc...
A @textfiles approach to gathering the world's DNS
Hacking Web Apps by Brent White
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
Applying principles of chaos engineering to serverless (CodeMesh)
Internal Pentest: from z3r0 to h3r0
Understanding and hiding your operations
Penetration testing, What’s this?
SignaturesAreDead Long Live RESILIENT Signatures
Hunting for the secrets in a cloud forest

Similar to Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo (20)

PDF
Different Methodology To Recon Your Targets
PDF
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
PDF
Unmasking or De-Anonymizing You
PDF
Putting Rugged Into your DevOps Toolchain
PPTX
Static Code Analysis
PPT
Anton Chuvakin on Discovering That Your Linux Box is Hacked
PDF
Securing Rails
PPT
BSidesDC 2016 Beyond Automated Testing
DOCX
They need either one Manually easy or Hard1. Go to dnschecker..docx
PDF
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
PPTX
Threat Hunting with Splunk
PPT
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
PDF
technical-information-gathering-slides.pdf
PDF
Shift Left Security
PDF
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
PPTX
( Ethical hacking tools ) Information grathring
PPTX
Test & Tea : ITSEC testing, manual vs automated
PDF
Filip palian mateuszkocielski. simplest ownage human observed… routers
Different Methodology To Recon Your Targets
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Unmasking or De-Anonymizing You
Putting Rugged Into your DevOps Toolchain
Static Code Analysis
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Securing Rails
BSidesDC 2016 Beyond Automated Testing
They need either one Manually easy or Hard1. Go to dnschecker..docx
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Threat Hunting with Splunk
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
technical-information-gathering-slides.pdf
Shift Left Security
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
( Ethical hacking tools ) Information grathring
Test & Tea : ITSEC testing, manual vs automated
Filip palian mateuszkocielski. simplest ownage human observed… routers

Recently uploaded (20)

PDF
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
PDF
Instagram's Product Secrets Unveiled with this PPT
PPTX
worship songs, in any order, compilation
PPTX
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
PPTX
Self management and self evaluation presentation
PPTX
Impressionism_PostImpressionism_Presentation.pptx
PPTX
Intro to ISO 9001 2015.pptx wareness raising
PPTX
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
PPTX
Effective_Handling_Information_Presentation.pptx
PPTX
Learning-Plan-5-Policies-and-Practices.pptx
PPTX
Primary and secondary sources, and history
PPTX
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
DOCX
"Project Management: Ultimate Guide to Tools, Techniques, and Strategies (2025)"
PPTX
2025-08-10 Joseph 02 (shared slides).pptx
PDF
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
PPTX
Project and change Managment: short video sequences for IBA
PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PPTX
Relationship Management Presentation In Banking.pptx
PPTX
Tour Presentation Educational Activity.pptx
PPTX
Introduction to Effective Communication.pptx
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
Instagram's Product Secrets Unveiled with this PPT
worship songs, in any order, compilation
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
Self management and self evaluation presentation
Impressionism_PostImpressionism_Presentation.pptx
Intro to ISO 9001 2015.pptx wareness raising
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
Effective_Handling_Information_Presentation.pptx
Learning-Plan-5-Policies-and-Practices.pptx
Primary and secondary sources, and history
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
"Project Management: Ultimate Guide to Tools, Techniques, and Strategies (2025)"
2025-08-10 Joseph 02 (shared slides).pptx
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
Project and change Managment: short video sequences for IBA
_ISO_Presentation_ISO 9001 and 45001.pptx
Relationship Management Presentation In Banking.pptx
Tour Presentation Educational Activity.pptx
Introduction to Effective Communication.pptx

Gone in 60 minutes – Practical Approach to Hacking an Enterprise with Yasuo

  • 1. A Practical Approach to Hacking an Enterprise with YASUO Saurabh Harit {@0xsauby} Stephen Hall {@_stephen_h}
  • 2. root@msf:~$>getuid Saurabh Harit (@0xsauby) Director of Security Research @Security Compass Pentester i.e. Domain Admin at many companies Have a secret crush on reverse engineering Gym freak / Proud father of two beautiful dogs Stephen Hall (@_stephen_h) Security Consultant @Security Compass … … Owner of a Christmas hat
  • 3. What this talk is not about No 0-days No Shells
  • 4. Scenario You’re on a red-team engagement You’ve bypassed physical security You’ve bypassed NAC What next? How would you pwn the network? Vulnerability scanner?
  • 5. The Problem Can’t use network vulnerability scanner Have to be Stealth & Quick Can’t use Google dorks (internal network) site, link, inurl
  • 6. Where do $hells come from? It’s not about what, it’s about WHERE
  • 7. Popular Vulnerable Apps Apache Tomcat
  • 8. Popular Vulnerable Apps JBoss jmx-console
  • 9. Popular Vulnerable Apps Hudson Jenkins
  • 11. Not So Popular Vulnerable Apps ADManager Plus
  • 12. Not So Popular Vulnerable Apps ADManager Plus
  • 13. Not So Popular Vulnerable Apps Cyberoam UTM
  • 14. Not So Popular Vulnerable Apps Cyberoam UTM
  • 15. YASUO what??? Written in ruby Did not write it on our flight here Scans the network for vulnerable applications Currently supports around 100+ vulnerable applications All currently supported apps are Metasploit-able
  • 16. Why Yasuo Because there are tons of vulnerable applications and its not easy to find them
  • 17. World Without Automation Run nmap scan & manually poke each & every web port This CANNOT be fun
  • 18. What’s currently out there Nikto by Chris Sullo https://www.cirt.net/Nikto2 Nmap script – http-enum.nse by Ron Bowes, Andrew Orr, Rob Nicholls http://nmap.org/nsedoc/scripts/http-enum.html Nmap script – http-default-accounts.nse by Paulino Calderon https://www.nmap.org/nmap-exp/ calderon/scripts/http-default-accounts.nse
  • 21. What’s in the Box yasuo.rb resp200.rb default-path.csv users.txt pass.txt GPL
  • 23. Behind the Scenes Detects false-positives Automatically extracts login form Automatically extracts login parameters
  • 25. RaNdOmIzAtIoN!!! More robust check to detect false positives Properly formatted output table More application signatures Signatures for IP Cameras / Encoder / Decoders Modular & Cleaned-up Code – if there is any such thing
  • 27. Challenges Exploit-db – great resource but inconsistent format
  • 28. Challenges Dynamic detection of login page and parameters is regex based.
  • 29. Future Development Smarter version detection Support masscan output format (because y’all love to scan the Interwebs) Add support for more vulnerable applications, Ofcourse Add secondary signature Make current crappy code modular Add multi-threading Add support for vFeed??? Change format of default path file – CSV to YAML? or JSON?
  • 30. CFH (cry for help) Signatures Signatures Signatures & Signatures Please submit application signatures: Post a comment on Github Update default path file on Github Drop us an Email Send a Pigeon.
  • 32. Thank You! https://github.com/0xsauby/yasuo ✖ 0xsauby saurabh.harit@gmail.com _stephen_h perfectlylogical@gmail.com
  • 33. Credit Nmap ruby library - https://github.com/sophsec/ruby-nmap The Exploit Database (EDB) - http://www.exploit-db.com/ @funkaoshi Google Image Cache